Originally focused on educating employees about cybersecurity risks, the company now wants to go a step further and push employees to minimize their attack surface.
Deepseek’s viral AI models and chatbot applications have been banned by a growing number of countries and government agencies, which have raised concerns about Deepseek’s ethics, privacy and security practices.
The UK internet regulator Ofcom has published the first set of final guidelines for online service providers subject to the Online Safety Act. This starts the clock ticking for the first deadline for compliance with the sweeping online harms law, which the regulator expects to come into force within three months.
Since 2021, we have published a year-end list highlighting the best cybersecurity stories reported by other outlets. Cybersecurity, surveillance, and privacy are huge topics that no single publication can cover effectively, but there are some reports by excellent online journalists that are worth mentioning.
This cybersecurity glossary includes some of the most common words and phrases we regularly use in our publications, and explanations of how and why we use them.
Despite several law enforcement victories against ransomware actors, such as the sweeping takedown of LockBit and the seizure of Radar, hackers continue to reap the rewards of these data-stealing attacks, and 2024 looks set to be their most profitable year yet.
If you ask some of the leading cybersecurity experts what their top concerns are, you probably wouldn’t expect young, advanced cybercriminals to be the first topic on their mind. However, in recent years, a new generation of profit-motivated cybercriminals has carried out some of the biggest attacks in history and doesn’t seem to be slowing down.
Earlier this year, a Microsoft developer noticed that someone had inserted a backdoor into the code of the open source utility XZ Utils, which is used in virtually all Linux operating systems.
News from late November this year that Chinese-backed hackers have compromised the wiretapping systems of several US internet and telecommunications providers, likely in an effort to gather intelligence on Americans, has surfaced in the media.
Supply chain attacks often target third-party services or open source software that make up a company's IT infrastructure, potentially resulting in serious financial consequences for the organization.
In recent years, identity management has become one of the fundamental pillars in the fight against security breaches. One of the main reasons for its relevance is the complexity that tracking it represents for organizations, which makes it a coveted target for malicious hackers.
The trend toward deepfakes has benefited companies that offer tools to combat them, as evidenced by the recent $100 million loan to Pindrop from Hercules Capital.
As the CrowdStrike update continues to have a global impact, a new company has managed to raise $13,5 million to improve at least one level of security on the types of devices affected.
During the course of 2024, there have been significant data breaches that have had a significant impact. These incidents have been considered some of the most serious in recent history.
The renowned cybersecurity service provider of Russian origin, Kaspersky, has announced its decision to reduce its workforce and withdraw from the United States market.
The US cybersecurity agency CISA stated that malicious individuals are taking advantage of this incident to carry out activities such as phishing and other malicious actions.
Artificial Intelligence (AI) is presented as a versatile tool that can assist in various tasks, such as composing emails or creating concept art, but it can also be used fraudulently to deceive vulnerable individuals by posing as an acquaintance in need.
Cookies In order for this site to function properly, we sometimes install small data files, known as cookies, on users' devices. Most of the big websites do too.